Seminaari: Tietoturvan testaus : Presentations

Presentations

  • 9.2. Lantto. Java vs. PHP: Security Implications of Language Choice for Web Applications by Walden, Doyle, Lenhof, and Murray. Opponent Osmani. Presentation as an article.
  • 16.2. Hankala. A virtual honeypot framework by Provos, SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. Opponent Waltari. Presentation as an article.
  • 23.2. Mukayeva. Effective and Efficient Malware Detection at the End Host by Clemens Kolbitsch , Paolo Milani Comparetti , Christopher Kruegel , Engin Kirda , Xiaoyong Zhou , Xiaofeng Wang. Proceeding SSYM'09 Proceedings of the 18th conference on USENIX security symposium. Opponent Kosteila. Presentation as an article.
  • 16.3. Aaltonen. Chip and PIN is Broken by Murdoch, Drimer, Andersson, Bond. 2010 IEEE Symposium on Security and Privacy. Opponent Sandvik. Presentation as an article.

     

  • 23.3. Valovirta. Experimental Security Analysis of a Modern Automobile by Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage. 2010 IEEE Symposium on Security and Privacy. Opponent Nyrhinen. Presentation as an article.
  • 30.3. Sandvik. VEX: Vetting Browser Extensions for Security Vulnerabilities by Sruthi Bandhakavi , Samuel T. King , P. Madhusudan , Marianne Winslett. USENIX Security Symposium (2010), pp. 339-354. Opponent Aaltonen. Presentation as an article.
  • 6.4. Waltari. DieHarder: Securing the Heap by Gene Novark and Emery D. Berger. CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. Opponent Lantto. Presentation as an article.
  • 13.4. Kosteila. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection by Tielei Wang, Tao Wei, Guofei Gu, Wei Zou. Proceedings of the 31st IEEE Symposium on Security & Privacy. Opponent Hankala. Presentation as an article.
  • 20.4. Osmani. Antisocial Networks: Turning a Social Network into a Botnet by
    E   E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. G. Anagnostakis, E. P. Markatos.   ISC '08 Proceedings of the 11th international conference on Information Security.  Opponent Mukayeva. Presentation as an article.